Risk
10/29/2012
01:28 PM
Connect Directly
RSS
E-Mail
50%
50%
Repost This

Intel Joins SAFECode

Intel joins a group of committed contributors and software industry leaders

WAKEFIELD, Mass., Oct. 29, 2012 /PRNewswire/ -- The Software Assurance Forum for Excellence in Code (SAFECode), a non-profit organization exclusively dedicated to increasing trust in information and communications technology products and services through the advancement of effective security assurance methods, today announced Intel® Corporation as its newest member. With membership, Intel joins a group of committed contributors and software industry leaders including Adobe Systems Incorporated, EMC Corporation, Juniper Networks, Inc., Microsoft Corp., Nokia, SAP AG, Siemens and Symantec Corp.

SAFECode is the first global, industry-led effort to identify and promote best practices for developing and delivering more secure and reliable software, hardware and services. In the first five years, the Forum has worked to aggressively advance an agenda that has measurably improved software security practices worldwide. Most recently, the Forum launched its Software Security Guidance for Agile Practitioners.

"The rapid advancement of threats has driven security requirements across - and more deeply within - systems than ever before," said Stacy Simpson, policy and communications director, SAFECode. "Intel's innovations and strength in embedding security at the foundation of computing devices brings another level of expertise and perspective to our efforts."

Jeffrey H. Cohen, Head of Product Security Assurance for Intel, will join SAFECode's Board of Directors and play an active role in the leadership of the association. As a new member, Intel will contribute to SAFECode's ongoing efforts to identify, share and promote security assurance best practices based on the lessons learned from real-world implementations - and will take an active role in current SAFECode projects that address secure development methods and training.

Membership in SAFECode is open to commercial technology providers with significant global business activity in hardware, software and/or services and that have demonstrated a commitment, and dedicated resources, to software assurance. For more information, please visit www.safecode.org.

About SAFECode The Software Assurance Forum for Excellence in Code (SAFECode) is a non-profit organization exclusively dedicated to increasing trust in information and communications technology products and services through the advancement of effective software assurance methods. SAFECode is a global, industry-led effort to identify and promote best practices for developing and delivering more secure and reliable software, hardware and services. Its members include Adobe Systems Incorporated, EMC Corporation, Juniper Networks, Inc., Microsoft Corp., Nokia, SAP AG, Siemens AG and Symantec Corp. For more information, please visit www.safecode.org.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-1421
Published: 2014-04-22
Cross-site scripting (XSS) vulnerability in Craig Knudsen WebCalendar before 1.2.5, 1.2.6, and other versions before 1.2.7 allows remote attackers to inject arbitrary web script or HTML via the Category Name field to category.php.

CVE-2013-2105
Published: 2014-04-22
The Show In Browser (show_in_browser) gem 0.0.3 for Ruby allows local users to inject arbitrary web script or HTML via a symlink attack on /tmp/browser.html.

CVE-2013-2187
Published: 2014-04-22
Cross-site scripting (XSS) vulnerability in Apache Archiva 1.2 through 1.2.2 and 1.3 before 1.3.8 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters, related to the home page.

CVE-2013-4116
Published: 2014-04-22
lib/npm.js in Node Packaged Modules (npm) before 1.3.3 allows local users to overwrite arbitrary files via a symlink attack on temporary files with predictable names that are created when unpacking archives.

CVE-2013-4472
Published: 2014-04-22
The openTempFile function in goo/gfile.cc in Xpdf and Poppler 0.24.3 and earlier, when running on a system other than Unix, allows local users to overwrite arbitrary files via a symlink attack on temporary files with predictable names.

Best of the Web